White Collar Crime Defense

Federal and Tennessee white collar crime defense: typical cases (wire and mail fraud, bank, securities, health care, and tax fraud), the electronic records, recordings, and metadata prosecutors use, how that evidence is gathered and authenticated, and the defenses available.

Tennessee and Federal White Collar Crime Defense

White collar cases are documents cases. They are built less on eyewitnesses than on emails, spreadsheets, bank records, accounting files, text messages, and the metadata behind all of it. A white collar prosecution—whether brought by Tennessee authorities or, more often, by federal prosecutors—typically begins long before charges are filed, with subpoenas, search warrants, and forensic review of electronic records. If you have learned that you are under investigation, or have received a target letter or grand jury subpoena, the decisions you make early can shape the entire case.

This page explains the kinds of cases that fall under the “white collar” label, the electronic records and recordings prosecutors rely on to build them, how that evidence is gathered and authenticated, and the defense strategies available. It is written to inform, not to substitute for advice about a specific case.

What Is White Collar Crime?

“White collar crime” is not a single statute but a broad category of non-violent offenses that generally involve deception, concealment, or breach of trust to obtain money, property, or an advantage. These cases are investigated and prosecuted aggressively—at the federal level by agencies such as the FBI, IRS Criminal Investigation, the SEC, the U.S. Postal Inspection Service, and others, working with the Department of Justice. Because the alleged loss amounts are often large, the penalties can be severe, including substantial prison time, heavy fines, restitution, and asset forfeiture.

Typical White Collar Cases

The category covers a wide range of conduct. Among the most common matters:

  • Wire fraud and mail fraud. The most frequently charged federal white collar offenses, under 18 U.S.C. § 1343 (wire) and § 1341 (mail). They are charged broadly because nearly any modern scheme touches an interstate wire—an email, a text, a bank transfer, a website—or the mail. Prosecutors often use them as a fallback when a more specific statute is harder to prove.
  • Bank fraud and financial institution fraud. Schemes to defraud a bank or to obtain funds from a financial institution by false pretenses.
  • Securities fraud. Insider trading, misrepresentations to investors, and related conduct, often investigated alongside the SEC.
  • Health care fraud. False billing, kickbacks, and related allegations involving Medicare, Medicaid, or private insurers.
  • Tax fraud and tax evasion. Investigated by IRS Criminal Investigation, frequently relying on financial records and reconstructions of income.
  • Embezzlement and theft. Misappropriation of funds entrusted to an employee or fiduciary.
  • Money laundering. Concealing the source or movement of allegedly illicit proceeds, often charged alongside an underlying offense.
  • Identity theft and computer fraud. Including charges under the Computer Fraud and Abuse Act and aggravated identity theft.
  • Pandemic-era and program fraud. PPP and COVID-relief fraud, procurement fraud, and similar matters drawing continued enforcement attention.
  • Bribery and public corruption. Improper payments to or by public officials and related schemes.

Many investigations begin as a suspected wire or mail fraud and grow into additional charges as the government learns more. It is also common for a single course of conduct to be charged under several statutes at once, and for the government to add a conspiracy count under 18 U.S.C. § 371.

The Evidence Prosecutors Use

White collar cases are won and lost on documents and data. The government typically assembles its case from several overlapping sources of evidence.

Electronic records and communications

This is the heart of most modern white collar prosecutions. Investigators gather and analyze:

  • Email and messaging. Corporate and personal email, plus text messages and chat from platforms and encrypted apps. Prosecutors mine these for statements of knowledge and intent—the hardest elements to prove—and for the timeline of a scheme.
  • Financial and transactional records. Bank statements, wire transfer records, accounting files, invoices, ledgers, and payment-processor data, often obtained from institutions by subpoena.
  • Business and corporate records. Contracts, internal reports, board materials, expense records, and internal-investigation files.
  • Device and cloud data. Material extracted from seized computers and phones, and data pulled from cloud accounts—documents, photos, location history, and app data.
  • Metadata. The data behind the data—creation and modification timestamps, authorship fields, edit history, and transmission records—used to establish who created or altered a document and when.
  • Emerging data types. Increasingly, blockchain and cryptocurrency wallet activity and the contents of encrypted-messaging accounts.

Recordings

Audio and video recordings appear frequently. They may come from consensually recorded calls or meetings (including those made by a cooperating witness or informant), from court-authorized wiretaps under the federal Wiretap Act (Title III) or Tennessee’s wiretapping statutes, from surveillance or pole cameras, or from recorded interviews. How a recording was made matters a great deal: an improperly authorized wiretap, or a recording that violates statutory consent requirements, can be challenged. The lawfulness of electronic interception and the gathering of digital evidence is discussed in more detail on our Electronic Surveillance Defense page.

Witnesses and cooperators

Documents are usually presented through witnesses: case agents, forensic accountants, custodians of records, and—often—cooperating insiders who have made deals with the government. A cooperator’s credibility, and the benefits they expect in return for testimony, are central to the defense.

How the Government Gathers the Evidence

Understanding the collection methods is essential, because each one is a potential point of challenge:

  • Grand jury subpoenas. The government’s primary tool for compelling documents and testimony before charges are filed. Subpoenas to banks, employers, and service providers produce much of the documentary record.
  • Search warrants. Used to seize devices, files, and business records. Because these warrants sweep up vast quantities of electronic data, their scope and particularity are frequently litigated.
  • Subpoenas and orders to service providers. Email providers, banks, and payment processors are routine sources of records.
  • Interviews and proffers. Investigators seek statements—sometimes through seemingly informal contact. Statements made without counsel can be damaging.
  • Whistleblowers and referrals. Many investigations begin with a tip, a civil regulatory referral, or information from another agency.

In a significant white collar case, discovery can run from hundreds of thousands to millions of pages of records. That volume is itself a strategic feature of the case for both sides.

Authentication of Electronic Evidence

Before electronic records reach a jury, the government must authenticate them—establish that they are what the prosecution claims. Under the Federal Rules of Evidence, authentication generally proceeds under Rule 901 (typically through a witness with knowledge) or, increasingly, under the self-authentication provisions of Rule 902. Amendments effective in 2017 added Rule 902(13), for records generated by an electronic process or system, and Rule 902(14), for data copied from an electronic device or storage medium, each provable by a qualified person’s certification rather than live testimony.

Importantly, a Rule 902(13) or (14) certification establishes only authenticity. It does not resolve hearsay, relevance, or, in a criminal case, the defendant’s Confrontation Clause rights. A certification that data came from a particular hard drive does not prove that the defendant put it there—that remains contestable. Business records obtained from a provider by subpoena often travel through the business-records framework of Rules 803(6) and 902(11), while data pulled from a personal device usually does not. These distinctions create real openings for the defense.

Defenses and Strategies in White Collar Cases

The right strategy is always fact-specific, but the recurring themes in white collar defense include:

  • Lack of intent. Fraud requires proof of specific intent to defraud—a knowing, willful scheme. Many cases turn on whether conduct was a crime or a good-faith business decision, a mistake, or a disagreement. Good faith is a defense to fraud.
  • No materiality. A misrepresentation generally must be material. Where an alleged false statement could not have influenced the decision at issue, the charge may fail.
  • Challenging the government’s interpretation of the data. Prosecutors build a narrative from ambiguous records. Reframing that data—through forensic review, context, and cross-examination—is often the core of the defense.
  • Suppression of unlawfully obtained evidence. Motions challenging the scope, particularity, or execution of search warrants; the legality of wiretaps and recordings; and the handling of seized data. (See our Electronic Surveillance Defense page for the warrant and surveillance analysis.)
  • Authentication and reliability challenges. Testing the chain of custody, the forensic methodology, and whether the government can actually tie a document or device entry to the defendant.
  • Attacking cooperator credibility. Exposing the deals, motives, and inconsistencies of cooperating witnesses.
  • Venue and jurisdiction. Federal fraud charges must be brought in a proper venue with the required connection to the district. Venue challenges can be significant.
  • Statute of limitations. Many white collar offenses carry time limits that can bar stale charges.
  • Fifth Amendment protections. The privilege against self-incrimination shapes how a client should respond to subpoenas, interviews, and document demands.
  • Pre-charge advocacy. In white collar matters there is often a window before charges are filed. Early, strategic engagement with prosecutors can sometimes prevent charges, narrow them, or affect their framing.

State and Federal Prosecutions

White collar conduct can be charged in Tennessee state court or in federal court—in Tennessee, in the Eastern, Middle, or Western District. Federal cases bring substantial investigative resources, the Federal Rules of Criminal Procedure and Evidence, and the Federal Sentencing Guidelines, under which loss amount heavily drives the sentence. The choice of forum, the applicable statutes, and the procedural rules all shape strategy, and a defendant facing a federal investigation should understand which system they are in and what that means.

If You Are Under Investigation

White collar investigations often unfold quietly. Signs include a grand jury subpoena, a target or subject letter, a request for an interview, agents contacting colleagues or family, or the seizure of records or devices. If any of these has happened, it is prudent to speak with an attorney before responding to the government, producing documents, or sitting for an interview. What you do at the investigation stage can matter as much as anything that happens later.

Related Practice Areas

Contact a Tennessee Criminal Defense Attorney Today

If you are under investigation for or charged with a white collar offense, the evidence against you is likely electronic—and how it was gathered, authenticated, and interpreted can be challenged. Contact our office today to schedule a confidential consultation and learn how we can help protect your rights.

This page is provided for general informational purposes only and does not constitute legal advice. Reading this information does not create an attorney-client relationship. The law governing white collar offenses and the rules of evidence are complex and change over time, and their application depends on the facts of each case. Statutory and rule references are provided for general reference and should be independently verified against current authority. You should consult a licensed attorney about your specific situation.